Istio: Up and Running by Zack Butcher & Lee Calcote
Author:Zack Butcher & Lee Calcote [Zack Butcher]
Language: eng
Format: epub
Publisher: O'Reilly Media, Inc.
Published: 2019-08-24T16:00:00+00:00
mutual, which establishes a mutual TLS connection to the destination endpoint
Istio mutual, which is mutual TLS using Istio-provisioned certificates
Enabling mTLS across the mesh via Istio’s mesh configuration is a shorthand for setting Istio mutual TLS as the value for all destinations in the mesh.
For example, we can use a DestinationRule to allow connecting to a HTTPS website outside of the mesh:
apiVersion: networking.istio.io/v1alpha3
kind: DestinationRule
metadata:
name: google.com
spec:
host: "*.google.com"
trafficPolicy:
tls:
mode: SIMPLE Or we can describe connecting to another server with mTLS:
apiVersion: networking.istio.io/v1alpha3
kind: DestinationRule
metadata:
name: remote-a-ingress
spec:
host: ingress.a.remote.cluster
trafficPolicy:
tls:
mode: MUTUAL
clientCertificate: /etc/certs/remote-cluster-a.pem
privateKey: /etc/certs/client_private_key_cluster_a.pem
caCertificates: /etc/certs/rootcacerts.pem A DestinationRule like the one above together with a ServiceEntry for “ingress.a.remote.cluster” can be used to route traffic across trust domains (e.g. separate clusters) over the internet, securely, with no VPN or other overlay networks. We cover zero-VPN networking and other topics in the Advanced Use Cases chapter of this book.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Coding Theory | Localization |
Logic | Object-Oriented Design |
Performance Optimization | Quality Control |
Reengineering | Robohelp |
Software Development | Software Reuse |
Structured Design | Testing |
Tools | UML |
Deep Learning with Python by François Chollet(12570)
Hello! Python by Anthony Briggs(9915)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9796)
The Mikado Method by Ola Ellnestam Daniel Brolund(9778)
Dependency Injection in .NET by Mark Seemann(9338)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8297)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7763)
Grails in Action by Glen Smith Peter Ledbrook(7696)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7557)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7073)
Microservices with Go by Alexander Shuiskov(6837)
Practical Design Patterns for Java Developers by Miroslav Wengner(6758)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6699)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6413)
Angular Projects - Third Edition by Aristeidis Bampakos(6102)
The Art of Crafting User Stories by The Art of Crafting User Stories(5630)
NetSuite for Consultants - Second Edition by Peter Ries(5565)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5371)
Kotlin in Action by Dmitry Jemerov(5062)
